School of Engineering, Technology and Design


Latest research outputs

Sort by Date Title
A distributed SVM ensemble for large scale image classification and annotation
Alham, K., Li, M., Liu, Y. and Qi, M. 2013. A distributed SVM ensemble for large scale image classification and annotation. Computers and Mathematics with Applications. 66 (10), pp. 1920-1934. https://doi.org/10.1016/j.camwa.2013.07.015

Journal article

Ontologies for security requirements: a literature survey and classification’
Souag, A. and Salinesi C., Comyn-Wattiau I. 2012. Ontologies for security requirements: a literature survey and classification’. https://doi.org/10.1007/978-3-642-31069-0_5

Conference or workshop item

A novel process for enhancing oil production in algae biorefineries through bioconversion of solid by-products
Hernandez, E., Colin, W. and Trzcinski, A. 2012. A novel process for enhancing oil production in algae biorefineries through bioconversion of solid by-products. Bioresource Technology. 116, pp. 295-301. https://doi.org/10.1016/j.biortech.2012.03.078

Journal article

A usability analysis of autopsy forensic browser
Bennett, D. and Stephens, P. 2008. A usability analysis of autopsy forensic browser.

Conference paper

Fast implementation of cel-based animation
Qi, M. 2008. Fast implementation of cel-based animation.

Conference paper

A case-based reasoning model for digital intrusion forensics
Qi, M., Wang, Y. and Xu, R. 2008. A case-based reasoning model for digital intrusion forensics.

Conference paper

Cybercrime legislation in China
Qi, M., Wang, Y. and Xu, R. 2008. Cybercrime legislation in China.

Conference paper

Drupal and Joomla security
Mousoli, R. 2008. Drupal and Joomla security.

Conference paper

The impact of extrinsic factors on the success of group-based assignments in undergraduate courses
Stock, G. 2009. The impact of extrinsic factors on the success of group-based assignments in undergraduate courses.

Conference paper

P2P DDoS: Challenges and Countermeasures
Qi, M. 2009. P2P DDoS: Challenges and Countermeasures.

Conference paper

Distributed indexing for resource discovery in P2P(Peer to Peer) networks
Qi, M., Hentschel, M., Li, M. and Ponraj, M. 2009. Distributed indexing for resource discovery in P2P(Peer to Peer) networks.

Conference paper

P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks)
Qi, M. 2009. P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks).

Conference paper

Spam and social effects
Qi, M., Edgar-Nevill, D. and Mousoli, R. 2009. Spam and social effects.

Conference paper

Human trust and e-trust
Mousoli, R. 2007. Human trust and e-trust.

Conference paper

Alice studies computing, Bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups
Bennett, D. and Lewis, D. 2007. Alice studies computing, Bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups.

Conference paper

Investigating the use of and the impact of mobile technology in gathering and manipulating data and digital images in tackling fly-tipping in the Medway towns
Faulkner, E. and Henson, R. 2007. Investigating the use of and the impact of mobile technology in gathering and manipulating data and digital images in tackling fly-tipping in the Medway towns.

Conference paper

Footprints of cyber criminals
Qi, M. and Edgar-Nevill, D. 2007. Footprints of cyber criminals.

Conference paper

Tracking email offenders
Edgar-Nevill, D. and Qi, M. 2007. Tracking email offenders.

Conference paper

Protecting intellectual property and computer software: legislation in China
Qi, M. and Wang, Y. 2010. Protecting intellectual property and computer software: legislation in China.

Conference paper

Machine learning based spam filtering: advantages and challenges
Qi, M. 2010. Machine learning based spam filtering: advantages and challenges.

Conference paper

OBIRE: ontology based bibliographic information publication and retrieval
Liu, X., Li, M., Liu, Y. and Qi, M. 2010. OBIRE: ontology based bibliographic information publication and retrieval. International Journal of Distributed Systems and Technologies. 1 (4), pp. 58-73.

Journal article

Cybercrime and relevant legislation in China
Qi, M. and Wang, Y. 2010. Cybercrime and relevant legislation in China. in: Reich, P. (ed.) Cybercrime and Security Oxford Oxford University Press. pp. 1-34

Book chapter

Traffic analysis, anonymity, ethics and digital 'cat and mouse' in cyberspace: a case study of China vs Iran
Mousoli, R. and Shahabi, J. 2010. Traffic analysis, anonymity, ethics and digital 'cat and mouse' in cyberspace: a case study of China vs Iran. Canterbury Canterbury Christ Church University.

Conference paper

Social networking sites, privacy and digital security: a case study of Facebook and Bebo
Mousoli, R. and Andrade, K. 2010. Social networking sites, privacy and digital security: a case study of Facebook and Bebo. Canterbury Canterbury Christ Church University.

Conference paper

Semantic analysis for spam filtering
Qi, M. and Mousoli, R. 2010. Semantic analysis for spam filtering.

Conference paper

Assessing cryptography: evaluating students at undergraduate level
Bennett, D. 2010. Assessing cryptography: evaluating students at undergraduate level.

Conference paper

MAPBOT: A web based map information retrieval system
Li, M. and Qi, M. 2003. MAPBOT: A web based map information retrieval system. Information and Software Technology. 45 (10), pp. 691-698. https://doi.org/10.1016/S0950-5849(03)00082-X

Journal article

Leveraging legacy codes to distributed problem-solving environments: a web services approach
Li, M. and Qi, M. 2004. Leveraging legacy codes to distributed problem-solving environments: a web services approach. Software: Practice and Experience. 34 (13), pp. 1297-1309. https://doi.org/10.1002/spe.614

Journal article

PGGA: a predictable and grouped genetic algorithm for job scheduling
Li, M., Yu, B. and Qi, M. 2006. PGGA: a predictable and grouped genetic algorithm for job scheduling. Future Generation Computer Systems. 22 (5), pp. 588-599. https://doi.org/10.1016/j.future.2005.09.001

Journal article

Lessons learned from Beijing for the London 2012
Edgar-Nevill, D. and Qi, M. 2009. Lessons learned from Beijing for the London 2012. in: Edgar-Nevill, D. (ed.) Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009 Canterbury, UK Canterbury Christ Church University.

Book chapter

Tracking online trails
Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. in: Jahankhani, H., Revett, K. and Palmer-Brown, D. (ed.) Global E-Security Springer.

Book chapter

Web services discovery with rough sets
Li, M., Yu, B., Sahota, V. and Qi, M. 2009. Web services discovery with rough sets. International Journal of Web Services Research. 6 (1), pp. 69-86.

Journal article

Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces
Li, M. and Qi, M. 2009. Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces. Peer-to-Peer Networking and Applications. 2 (4), pp. 283-297. https://doi.org/10.1007/s12083-009-0036-8

Journal article

Optimizing peer selection in BitTorrent networks with genetic algorithms
Wu, T., Li, M. and Qi, M. 2010. Optimizing peer selection in BitTorrent networks with genetic algorithms. Future Generation Computer Systems. 26 (8), pp. 1151-1156. https://doi.org/10.1016/j.future.2010.05.016

Journal article

Automatically wrapping legacy software into services: a grid case study
Li, M., Yu, B., Qi, M. and Antonopoulos, N. 2008. Automatically wrapping legacy software into services: a grid case study. Peer-to-Peer Networking and Applications. 1 (2), pp. 139-147. https://doi.org/10.1007/s12083-008-0011-9

Journal article

Tracking online trails
Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. International Journal of Electronic Security and Digital Forensics. 1 (4), pp. 353-361. https://doi.org/10.1504/IJESDF.2008.021453

Journal article

Comparison between a two-stage and single-stage digesters when treating a synthetic wastewater contaminated with phenol
Hernandez, J. E. and Edyvean, R.G.J. 2011. Comparison between a two-stage and single-stage digesters when treating a synthetic wastewater contaminated with phenol. Water SA. 37 (1), pp. 1-6. https://doi.org/10.4314/wsa.v37i1.64103

Journal article

Social networking searching and privacy issues
Qi, M. and Edgar-Nevill, D. 2011. Social networking searching and privacy issues. Information Security Technical Report. 16 (2), pp. 74-78. https://doi.org/10.1016/j.istr.2011.09.005

Journal article

A WSRF based shopping cart system
Li, M., Qi, M., Rozati, M. and Yu, B. 2005. A WSRF based shopping cart system. Lecture Notes in Computer Science [Advances in Grid Computing (EGC) 2005 European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers]. 3470, pp. 105-137. https://doi.org/10.1007/b137919

Journal article

String matching enhancement for snort IDS
S. O. Al-Mamory, Ali Hamid, A. Abdul-Razak and Z. Falah 2010. String matching enhancement for snort IDS. in: 5th International Conference on Computer Sciences and Convergence Information Technology IEEE. pp. 1020-1023

Book chapter

  • 38871
    total views
  • 22316
    total downloads
  • 71
    views this month
  • 26
    downloads this month